Prestige 334 User’s Guide
14.1.3.1 Encryption ...................................................................................
150
14.1.3.2 Data Confidentiality .....................................................................
151
14.1.3.3 Data Integrity ...............................................................................
14.1.3.4 Data Origin Authentication ..........................................................
14.1.4 VPN Applications ..................................................................................
14.2
IPSec Architecture .........................................................................................
14.2.1 IPSec Algorithms ..................................................................................
152
14.2.2 Key Management ..................................................................................
14.3
Encapsulation .................................................................................................
14.3.1 Transport Mode ....................................................................................
153
14.3.2 Tunnel Mode .........................................................................................
14.4
IPSec and NAT ...............................................................................................
VPN Screens.......................................................................................................
156
15.1
VPN/IPSec Overview .....................................................................................
15.2
IPSec Algorithms ............................................................................................
15.2.1 AH (Authentication Header) Protocol ....................................................
15.2.2 ESP (Encapsulating Security Payload) Protocol ..................................
15.3
My IP Address ................................................................................................
157
15.4
Secure Gateway Address ..............................................................................
15.4.1 Dynamic Secure Gateway Address ......................................................
158
15.5
Summary Screen ...........................................................................................
15.6
Keep Alive ......................................................................................................
160
15.7
NAT Traversal ................................................................................................
15.7.1 NAT Traversal Configuration .................................................................
15.7.2 Remote DNS Server .............................................................................
161
15.8
ID Type and Content ......................................................................................
162
15.8.1 ID Type and Content Examples ............................................................
163
15.9
Pre-Shared Key ..............................................................................................
15.10 Editing VPN Rules ........................................................................................
164
15.11 IKE Phases ..................................................................................................
167
15.11.1 Negotiation Mode ................................................................................
168
15.11.2 Diffie-Hellman (DH) Key Groups .........................................................
15.11.3 Perfect Forward Secrecy (PFS) ..........................................................
15.12 Configuring Advanced IKE Settings .............................................................
169
15.13 Manual Key Setup ........................................................................................
174
15.13.1 Security Parameter Index (SPI) ..........................................................
175
15.14 Configuring Manual Key ...............................................................................
15.15 Viewing SA Monitor ......................................................................................
178
15.16 Configuring Global Setting ...........................................................................
179
15.17 Telecommuter VPN/IPSec Examples ...........................................................
180
15.17.1 Telecommuters Sharing One VPN Rule Example ..............................
13
Table of Contents